US8955121B2 - System, method, and computer program product for dynamically adjusting a level of security applied to a system - Google Patents
System, method, and computer program product for dynamically adjusting a level of security applied to a system Download PDFInfo
- Publication number
- US8955121B2 US8955121B2 US14/098,274 US201314098274A US8955121B2 US 8955121 B2 US8955121 B2 US 8955121B2 US 201314098274 A US201314098274 A US 201314098274A US 8955121 B2 US8955121 B2 US 8955121B2
- Authority
- US
- United States
- Prior art keywords
- level
- monitoring
- programmable device
- activity
- executed cause
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Definitions
- the present invention relates to security systems, and more particularly to the application of security systems.
- security systems have been utilized for securing devices from unwanted activity (e.g. malware, etc.). Oftentimes, such security systems have provided security from unwanted activity by performing monitoring and scanning operations.
- traditional security systems have generally exhibited various limitations. Just by way of example, a level of security applied by traditional security systems has conventionally been static, thus resulting in unnecessary resource consumption when the level of security is higher than that necessary to detect unwanted activity and further resulting in insufficient security when the level of security is lower than that necessary to detect the unwanted activity.
- a system, method, and computer program product are provided for dynamically adjusting a level of security applied to a system.
- predetermined activity that is at least potentially associated with unwanted activity is identified on a system.
- a level of security applied to the system is dynamically adjusted, in response to the identification of the predetermined activity.
- FIG. 1 illustrates a network architecture, in accordance with one embodiment.
- FIG. 2 shows a representative hardware environment that may be associated with the servers and/or clients of FIG. 1 , in accordance with one embodiment.
- FIG. 3 illustrates a method for dynamically adjusting a level of security applied to a system, in accordance with one embodiment.
- FIG. 4 illustrates a method for processing a system event utilizing a dynamically adjusted level of security, in accordance with another embodiment.
- FIG. 5 illustrates a method for detecting unwanted data utilizing a dynamically adjusted level of security, in accordance with yet another embodiment.
- FIG. 1 illustrates a network architecture 100 , in accordance with one embodiment.
- a plurality of networks 102 is provided.
- the networks 102 may each take any form including, but not limited to a local area network (LAN), a wireless network, a wide area network (WAN) such as the Internet, peer-to-peer network, etc.
- LAN local area network
- WAN wide area network
- peer-to-peer network etc.
- servers 104 which are capable of communicating over the networks 102 .
- clients 106 are also coupled to the networks 102 and the servers 104 .
- Such servers 104 and/or clients 106 may each include a desktop computer, lap-top computer, hand-held computer, mobile phone, personal digital assistant (PDA), peripheral (e.g. printer, etc.), any component of a computer, and/or any other type of logic.
- PDA personal digital assistant
- peripheral e.g. printer, etc.
- any component of a computer and/or any other type of logic.
- at least one gateway 108 is optionally coupled therebetween.
- FIG. 2 shows a representative hardware environment that may be associated with the servers 104 and/or clients 106 of FIG. 1 , in accordance with one embodiment.
- Such figure illustrates a typical hardware configuration of a workstation in accordance with one embodiment having a central processing unit 210 , such as a microprocessor and a number of other units interconnected via a system bus 212 .
- a central processing unit 210 such as a microprocessor and a number of other units interconnected via a system bus 212 .
- the workstation shown in FIG. 2 includes a Random Access Memory (RAM) 214 , Read Only Memory (ROM) 216 , an I/O adapter 218 for connecting peripheral devices such as disk storage units 220 to the bus 212 , a user interface adapter 222 for connecting a keyboard 224 , a mouse 226 , a speaker 228 , a microphone 232 , and/or other user interface devices such as a touch screen (not shown) to the bus 212 , communication adapter 234 for connecting the workstation to a communication network 235 (e.g., a data processing network) and a display adapter 236 for connecting the bus 212 to a display device 238 .
- a communication network 235 e.g., a data processing network
- display adapter 236 for connecting the bus 212 to a display device 238 .
- the workstation may have resident thereon any desired operating system. It will be appreciated that an embodiment may also be implemented on platforms and operating systems other than those mentioned.
- One embodiment may be written using JAVA, C, and/or C++ language, or other programming languages, along with an object oriented programming methodology.
- Object oriented programming (OOP) has become increasingly used to develop complex applications.
- FIG. 3 illustrates a method 300 for dynamically adjusting a level of security applied to a system, in accordance with one embodiment.
- the method 300 may be carried out in the context of the architecture and environment of FIGS. 1 and/or 2 . Of course, however, the method 300 may be carried out in any desired environment.
- predetermined activity that is at least potentially associated with unwanted activity is identified on a system.
- the system may include any device (e.g. computer, etc.), operating system, etc. on which predetermined activity that is at least potentially associated with unwanted activity may be identified.
- the system may include any of the devices described above with respect to FIGS. 1 and/or 2 .
- the predetermined activity may include any activity capable of being identified on the system that is predetermined and that is at least potentially associated with unwanted activity.
- the activity may be predetermined by a user.
- the activity may be included in a list of various different types of predetermined activity.
- the activity may be predetermined automatically.
- the activity may be included in the list of various different types of predetermined activity in response to a previous determination that such activity is at least potentially associated with unwanted activity.
- the activity may be predetermined to be at least potentially associated with the unwanted activity.
- the activity may be predetermined in any manner.
- the predetermined activity may be capable of being utilized by the unwanted activity, such that the predetermined activity is at least potentially associated with the unwanted activity.
- the predetermined activity may be predetermined (e.g. based on a history of occurrences of the predetermined activity, etc.) to increase a vulnerability of the system to the unwanted activity.
- the predetermined activity may include activity capable of allowing the unwanted activity to be detected (e.g. self-extracting activity, etc.). It should be noted that the unwanted activity may include malware activity and/or any other activity that is unwanted.
- the predetermined activity may include a process connecting to an external network (e.g. the Internet, etc.).
- the predetermined activity may include loading an executable, such as an application, dynamic link library (DLL), web browser plug-in, etc.
- the executable may be excluded from a predefined list of known good (e.g. non-malicious) executables (e.g. executables predetermined to be associated with wanted activity), such as a whitelist of executables.
- the predetermined activity may include any type offloading [e.g. loading instructions into a central processing unit (CPU), etc.].
- the predetermined activity may include loading a process within an executable (e.g. an executable excluded from the whitelist, etc.).
- the predetermined activity may include loading a process from an untrusted source (e.g. a source excluded from a predefined list of trusted sources, etc.).
- the predetermined activity may include accessing a website excluded from a predefined list of known good (e.g. non-malicious) websites (e.g. websites predetermined to be associated with non-malicious activity), such as a whitelist of websites.
- the predetermined activity may include activity performed utilizing such a website. For example, the activity may include downloading content from the website, loading content from the website, etc.
- the predetermined activity may include activity of a process that is not included in predetermined activity for the process.
- the predetermined activity for the process may include types of activity predetermined to be allowed for the process, predetermined to be historically utilized by the process, etc.
- the predetermined activity may optionally include elevation of privileges (e.g. system access privileges, etc.) by a process, for example, if the elevation of the privileges is predetermined to be not allowed or historically utilized by the process.
- the predetermined activity may be identified utilizing monitoring of activity on the system.
- the monitoring may include a base level (e.g. default level, etc.) of monitoring.
- the base level monitoring may include monitoring for predefined types of activity that include the predetermined activity identified in operation 302 .
- the monitoring may include monitoring input and output (I/O) operations of the system utilizing filter drivers. Accordingly, the monitoring may utilize I/O filter drivers.
- the filter drivers may include file system filter drivers, just by way of example.
- the monitoring may be performed by implementing host environment callback functions.
- the host environment may include any environment capable of performing the monitoring.
- the host environment may include a web browser, an operating system, etc.
- event callback functions may be implemented by an operating system for allowing the monitoring (e.g. of registry activity, etc.).
- the monitoring may be performed by redirecting an interface [e.g. application program interface (API), etc.] invocation to a monitoring callback function utilizing a hook.
- the interface may optionally be redirected utilizing an inline hook.
- the interface may be redirected by redirecting a pointer to the interface.
- API application program interface
- a level of security applied to the system is dynamically adjusted, in response to the identification of the predetermined activity.
- the security applied to the system may include the monitoring of the system, scanning of the system (e.g. scanning at least a portion of data associated with the predetermined activity for the unwanted data, etc.), an analysis performed with respect to the system, and/or any other processes capable of being applied to the system for securing the system (e.g. from unwanted activity, etc.).
- the level of security may optionally include a degree of security capable of being applied to the system for securing the system.
- the security may be applied to the system with respect to any level of granularity associated with the system.
- the security may be applied with respect to predetermined processes, threads and/or activity initiated by code executing from a particular portion of memory of the system.
- the level of security may be dynamically adjusted in any desired manner.
- the level of security applied to the system may be dynamically adjusted by increasing the level of security.
- the level of security may be increased by performing additional monitoring of the system (e.g. beyond the base level monitoring performed to identify the predetermined activity in operation 302 ).
- the additional monitoring may include monitoring for additional types of predetermined activity not monitored by the base level monitoring.
- the level of security may be increased by performing additional monitoring of the predetermined activity (e.g. beyond the base level monitoring performed to identify the predetermined activity in operation 302 ).
- the additional monitoring may include monitoring for additional types of accesses performed by the identified predetermined activity that are not otherwise monitored by the base level monitoring. Such accesses may include creating, opening, writing to, deleting, etc. files, in various embodiments.
- the level of security may be increased by expanding the scanning performed on the system.
- the scanning may include searching data stored on the system for patterns that match previously identified patterns of unwanted data (e.g. malware patterns, etc.).
- the previously identified patterns of unwanted data may be stored in a database, as an option.
- data stored on the system may be scanned utilizing signatures of unwanted data for determining whether such data is unwanted.
- the scanning may be expanded with respect to a base level of scanning implemented during the identification of the predetermined activity in operation 302 .
- the base level of scanning may be capable of scanning a first subset of file operations for unwanted data
- the expanded scanning may be capable of scanning a second subset of file operations that includes more file operations than then first subset.
- the expanded scanning may be capable of scanning more portions of memory of the system than that capable of being scanned by the base level scanning.
- the level of security applied to the system may be dynamically adjusted by decreasing the level of security.
- the level of security may be decreased by performing less monitoring of the system (e.g. less than the base level monitoring performed to identify the predetermined activity in operation 302 ).
- the lessened monitoring may include monitoring for fewer types of predetermined activity than that monitored by the base level monitoring.
- the level of security may be decreased by performing less monitoring of the predetermined activity (e.g. less than the base level monitoring performed to identify the predetermined activity in operation 302 ).
- the lessened monitoring may include monitoring for fewer types of accesses performed by the identified predetermined activity than that monitored by the base level monitoring.
- the level of security may be decreased by reducing the scanning performed on the system.
- the scanning may be reduced with respect to a base level of scanning implemented during the identification of the predetermined activity in operation 302 .
- the base level of scanning may be capable of scanning a first subset of file operations for unwanted data, whereas the reduced scanning may be capable of scanning only a fraction of the first subset of file operations.
- the reduced scanning may be capable of scanning fewer portions of memory of the system than that capable of being scanned by the base level scanning.
- the level of security applied to the system may be dynamically adjusted in response to identification on the system of predetermined activity that at least potentially includes unwanted activity.
- Such dynamically adjusted security may be utilized to reduce system resource consumption resulting from unwanted activity detection processes when predetermined activity potentially associated with the unwanted activity is not identified.
- the dynamically adjusted security may be utilized to increase a level of unwanted activity detection utilized when predetermined activity potentially associated with the unwanted activity is identified, such that the unwanted activity may be prevented from evading detection that may otherwise occur due to the application of lower level security.
- the level of security applied to the system may be dynamically adjusted in response to identification of the predetermined activity and a history of predetermined activity identified on the system.
- the identification of the predetermined activity and the history of predetermined activity may be evaluated for determining a behavior of the system, such that the level of security may be dynamically adjusted based on the behavior of the system.
- the level of security may be increased. Similarly, if the latest identification of the predetermined activity and the history of predetermined activity is lower than a minimum threshold, the level of security may be decreased.
- the system may be monitored at a base level for various types of predetermined activity.
- One of such types of predetermined activity may include execution of a packer, for example.
- the packer may include a self-extracting payload capable of being utilized by malware to extract or decrypt portions of the malware from the payload such that the extracted or decrypted malware portions may be executed.
- activity including extraction or decryption of a payload may be identified.
- a level of security applied to the system on which the activity was identified may be dynamically adjusted. For example, the level of security may be dynamically increased to a level of security higher than a base level of scanning enabled during identification the activity.
- the increased level of security may include performing scanning of data associated with the packer (e.g. the extracted data, etc.) for determining whether the data is unwanted. In this way, malware that is exposed to detection by being extracted from a payload may be detected utilizing the increased level of security.
- a data leakage prevention system may perform the base level of monitoring for identifying an open operation of files that include confidential data, personally identifiable information (e.g. social security number, etc.), etc.
- a level of security e.g. monitoring and scanning
- a level of security applied to the process utilized to perform the open operation may be dynamically increased.
- the level of security may be adjusted with respect to forensics.
- the system may utilize such forensics for establishing various facts.
- the system may optionally utilize forensics to identify predetermined activity that is at least potentially associated with unwanted activity on the system, and may further dynamically adjust a level of security applied to the system based on the identification of the predetermined activity.
- FIG. 4 illustrates a method 400 for processing a system event utilizing a dynamically adjusted level of security, in accordance with another embodiment.
- the method 400 may be carried out in the context of the architecture and environment of FIGS. 1-3 .
- the method 400 may be carried out in any desired environment. It should also be noted that the aforementioned definitions may apply during the present description.
- a system event is collected.
- the system event may include any predetermined activity on a system that is at least potentially associated with unwanted activity.
- system event may be collected in response to a determination that the system event is a predetermined type of system event.
- collecting the system event may include identifying the system event.
- collecting the system event may include logging the system event in a history of collected system events.
- the system event may be collected utilizing a base level monitoring for such system event.
- the system event and a collected history are evaluated, as shown in operation 404 .
- the collected history may include the history of collected system events noted above.
- the collected history may include a history of system events that are each a predetermined type of system event.
- system event and collected history may be evaluated according to a predefined policy.
- the system event and collected history may be compared to at least one rule included in the predefined policy.
- the system event and collected history may be evaluated utilizing a behavioral analysis.
- the applied system monitoring may include the base level monitoring utilized to collect the system event (in operation 402 ). Of course, however, the applied system monitoring may include any monitoring enabled on the system.
- the determination may be based on the evaluation of the system event and collected history. For example, the determination may be based on whether the policy has been violated by the system event and collected history. Thus, in one embodiment, it may be determined that the applied system monitoring is to be dynamically adjusted if the policy (e.g. rule of the policy) has been violated by the system event and collected history.
- the policy e.g. rule of the policy
- the applied system monitoring is dynamically adjusted. Note operation 412 .
- the adjustment of the applied system monitoring may include dynamically increasing or decreasing a level of the applied system monitoring, in various embodiments.
- the policy may optionally indicate whether the level of the applied system monitoring is to be dynamically increased or decreased.
- the applied scanning may include a base level of scanning applied to the system during the collection of the system event (in operation 402 ). Of course, however, the applied scanning may include any scanning enabled on the system. Such scanning may be utilized for scanning data on the system for unwanted data, in one embodiment.
- the determination of whether the applied scanning is to be dynamically adjusted may be based on the policy. For example, the determination may be based on whether the policy has been violated by the system event and collected history. Thus, in one embodiment, it may be determined that the applied scanning is to be dynamically adjusted if the policy (e.g. rule of the policy) has been violated by the system event and collected history. As another option, the determination of whether the applied scanning is to be dynamically adjusted may be based on the type of the system event collected (e.g. according to predefined rules, etc.).
- the applied scanning is dynamically adjusted. Note operation 414 .
- the adjustment of the applied scanning may include dynamically increasing or decreasing a level of the applied scanning, in various embodiments.
- the policy may optionally indicate whether the level of the applied scanning is to be dynamically increased or decreased.
- processing of the system event is completed. Note operation 410 .
- processing of the system event may include further monitoring of the system event. In this way, the system event may be monitored at the dynamically adjusted level of system monitoring if it is determined in decision 406 that the applied system monitoring is to be dynamically adjusted.
- processing of the system event may include scanning the system event.
- the system event may be scanned for unwanted data.
- the system event may be scanned at the dynamically adjusted level of scanning if it is determined in decision 408 that the applied scanning is to be dynamically adjusted.
- the dynamically adjusted system monitoring and/or applied scanning may be dynamically readjusted in response to completion of the processing of the system event.
- the applied system monitoring and/or the applied scanning may be readjusted to the level (e.g. base level) that was previously applied to the system when the system event was collected (in operation 402 ).
- the applied system monitoring and/or the applied scanning may be re-adjusted at any time, such as based on the collection of additional system events.
- FIG. 5 illustrates a method 500 for detecting unwanted data utilizing a dynamically adjusted level of security, in accordance with yet another embodiment.
- the method 500 may be carried out in the context of the architecture and environment of FIGS. 1-4 .
- the method 500 may be carried out in any desired environment.
- the aforementioned definitions may apply during the present description.
- a base level of monitoring is enabled.
- the base level of monitoring may include a default level of monitoring (e.g. preconfigured by a user, etc.).
- the base level of monitoring may be enabled for a system upon startup of the system.
- system activity is monitored utilizing the current level of monitoring, as shown in operation 504 .
- the current level of monitoring may include the enabled level of monitoring.
- the system activity may be monitored utilizing such base level of monitoring.
- the system activity may be monitored for identifying predetermined activity on the system, with respect to the present embodiment.
- decision 506 it is determined whether the predetermined activity is identified utilizing the current level of monitoring. If it is determined that the predetermined activity is not identified utilizing the current level of monitoring, system activity continues to be monitored utilizing the current level of monitoring (operation 504 ). In this way, system monitoring may be continuously performed for identifying predetermined activity on the system.
- the determination may be based on a policy.
- the policy may indicate the level of monitoring to be enabled in response to identification of the particular type of predetermined activity identified in decision 506 .
- the current level of monitoring is dynamically adjusted, as shown in operation 510 .
- the current level of monitoring may be adjusted by being increased or decreased (e.g., based on the policy, etc.).
- the adjusted current level of monitoring may only be used for monitoring the identified predetermined activity, such that the previous level of monitoring (e.g., the base level) may be utilized for monitoring remaining system activity.
- the adjusted current level of monitoring may be used for monitoring all system activity.
- the current level of scanning may include a level of scanning enabled on the system.
- the determination may be based on the policy.
- the policy may indicate the level of scanning to be enabled in response to identification of the particular type of predetermined activity identified in decision 506 .
- the predetermined activity is determined whether the current level of scanning is not to be dynamically adjusted. If it is determined that the predetermined activity has completed, system activity continues to be monitored utilizing the current level of monitoring (operation 504 ). In this way, the predetermined activity may continue to be monitored at the current level of monitoring until completion of such predetermined activity. As an option, in response to a determination that the predetermined activity has completed, the level of monitoring may be readjusted to the base level of monitoring.
- an adjusted level of scanning is dynamically enabled. Note operation 516 .
- the current level of scanning may be adjusted by being increased or decreased (e.g., based on the policy, etc.). For example, the current level of scanning may be adjusted such that fewer or additional scanning operations are enabled.
- data associated with the monitored activity is scanned utilizing the adjusted level of scanning.
- the data associated with the monitored activity may include all data (e.g. code, files, etc.) utilized by, accessed by, the source for, etc. all activity monitored on the system subsequent to the adjustment to the level of scanning.
- the data associated with the monitored activity may include only the data associated with the predetermined activity identified (in decision 506 ).
- the data associated with the monitored activity may be scanned for unwanted data.
- such data may be scanned for malware.
- the reaction may include any reaction to the unwanted activity.
- the reaction may include blocking the activity associated with the data, quarantining the data, reporting the unwanted data, logging the unwanted data, etc. In this way, unwanted data may be detected utilizing the dynamically adjusted level of monitoring and/or scanning.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/098,274 US8955121B2 (en) | 2008-04-29 | 2013-12-05 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
US14/615,271 US20150186646A1 (en) | 2008-04-29 | 2015-02-05 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/111,851 US8621608B2 (en) | 2008-04-29 | 2008-04-29 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
US14/098,274 US8955121B2 (en) | 2008-04-29 | 2013-12-05 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/111,851 Continuation US8621608B2 (en) | 2008-04-29 | 2008-04-29 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/615,271 Continuation US20150186646A1 (en) | 2008-04-29 | 2015-02-05 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140096252A1 US20140096252A1 (en) | 2014-04-03 |
US8955121B2 true US8955121B2 (en) | 2015-02-10 |
Family
ID=49326340
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/111,851 Active 2030-12-18 US8621608B2 (en) | 2008-04-29 | 2008-04-29 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
US14/098,274 Active US8955121B2 (en) | 2008-04-29 | 2013-12-05 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
US14/615,271 Abandoned US20150186646A1 (en) | 2008-04-29 | 2015-02-05 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/111,851 Active 2030-12-18 US8621608B2 (en) | 2008-04-29 | 2008-04-29 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/615,271 Abandoned US20150186646A1 (en) | 2008-04-29 | 2015-02-05 | System, method, and computer program product for dynamically adjusting a level of security applied to a system |
Country Status (1)
Country | Link |
---|---|
US (3) | US8621608B2 (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8561176B1 (en) | 2007-01-24 | 2013-10-15 | Mcafee, Inc. | System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface |
US9275231B1 (en) * | 2009-03-10 | 2016-03-01 | Symantec Corporation | Method and apparatus for securing a computer using an optimal configuration for security software based on user behavior |
US9246932B2 (en) | 2010-07-19 | 2016-01-26 | Sitelock, Llc | Selective website vulnerability and infection testing |
US8752171B2 (en) | 2010-09-03 | 2014-06-10 | Mcafee, Inc. | Behavioral tracking system, method, and computer program product for undoing events based on user input |
US8707434B2 (en) | 2011-08-17 | 2014-04-22 | Mcafee, Inc. | System and method for indirect interface monitoring and plumb-lining |
US9043397B1 (en) * | 2011-08-22 | 2015-05-26 | Twitter, Inc. | Suggestions from a messaging platform |
US9178746B2 (en) * | 2012-07-03 | 2015-11-03 | Google Inc. | Browser-based fetch of external libraries |
US9225737B2 (en) * | 2013-03-15 | 2015-12-29 | Shape Security, Inc. | Detecting the introduction of alien content |
RU2571723C2 (en) | 2013-12-05 | 2015-12-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of reducing load on operating system when executing antivirus application |
EP2881883B1 (en) * | 2013-12-05 | 2018-04-11 | AO Kaspersky Lab | System and method for reducing load on an operating system when executing antivirus operations |
US9619012B2 (en) | 2014-05-30 | 2017-04-11 | Apple Inc. | Power level control using power assertion requests |
US10430577B2 (en) | 2014-05-30 | 2019-10-01 | Apple Inc. | Method and apparatus for inter process privilige transfer |
US9396089B2 (en) | 2014-05-30 | 2016-07-19 | Apple Inc. | Activity tracing diagnostic systems and methods |
US20150365469A1 (en) * | 2014-06-17 | 2015-12-17 | Google Inc. | System and method for integrating web and native applications from web-based contexts |
US9742792B2 (en) * | 2014-10-01 | 2017-08-22 | Whitehat Security, Inc. | Site security monitor |
US9876849B2 (en) | 2014-11-05 | 2018-01-23 | Google Llc | Opening local applications from browsers |
KR101670687B1 (en) * | 2014-12-17 | 2016-10-31 | 주식회사 케이티 | System, method and computer program for sending message |
US10075455B2 (en) * | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
US9654496B1 (en) * | 2015-03-31 | 2017-05-16 | Juniper Networks, Inc. | Obtaining suspect objects based on detecting suspicious activity |
US10771436B2 (en) * | 2018-04-06 | 2020-09-08 | Cisco Technology, Inc. | Dynamic whitelist management |
CN113196265A (en) * | 2018-12-19 | 2021-07-30 | 惠普发展公司,有限责任合伙企业 | Security detection assay |
US11765187B2 (en) * | 2020-11-10 | 2023-09-19 | Cobalt Iron, Inc. | Data inspection system and method |
US11663362B2 (en) | 2020-11-10 | 2023-05-30 | Cobalt Iron, Inc. | Data inspection system and method |
Citations (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5974549A (en) | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US6530024B1 (en) * | 1998-11-20 | 2003-03-04 | Centrax Corporation | Adaptive feedback security system and method |
US20030131256A1 (en) | 2002-01-07 | 2003-07-10 | Ackroyd Robert John | Managing malware protection upon a computer network |
US6594686B1 (en) | 2000-03-02 | 2003-07-15 | Network Associates Technology, Inc. | Obtaining user responses in a virtual execution environment |
US20030149888A1 (en) | 2002-02-01 | 2003-08-07 | Satyendra Yadav | Integrated network intrusion detection |
US20030149887A1 (en) | 2002-02-01 | 2003-08-07 | Satyendra Yadav | Application-specific network intrusion detection |
US20050071633A1 (en) | 2003-09-30 | 2005-03-31 | Check Point Software Technologies, Inc. | System Providing Methodology for Securing Interfaces of Executable Files |
US20050108562A1 (en) | 2003-06-18 | 2005-05-19 | Khazan Roger I. | Technique for detecting executable malicious code using a combination of static and dynamic analyses |
US6931540B1 (en) | 2000-05-31 | 2005-08-16 | Networks Associates Technology, Inc. | System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed |
US20050182967A1 (en) | 2004-02-13 | 2005-08-18 | Microsoft Corporation | Network security device and method for protecting a computing device in a networked environment |
US20060041942A1 (en) | 2004-06-24 | 2006-02-23 | Mcafee, Inc. | System, method and computer program product for preventing spyware/malware from installing a registry |
GB2418503A (en) | 2004-09-27 | 2006-03-29 | Mcafee Inc | Virus scanner with integrated spyware scanning/detecting capabilities |
US20060143447A1 (en) | 2004-12-23 | 2006-06-29 | Microsoft Corporation | Managing elevated rights on a network |
US7085934B1 (en) | 2000-07-27 | 2006-08-01 | Mcafee, Inc. | Method and system for limiting processor utilization by a virus scanner |
US7188367B1 (en) | 2001-03-30 | 2007-03-06 | Moafee, Inc. | Virus scanning prioritization using pre-processor checking |
GB2432686A (en) | 2005-11-25 | 2007-05-30 | Mcafee Inc | Accelerated file scanning for spyware/malware |
GB2432687A (en) | 2005-11-25 | 2007-05-30 | Mcafee Inc | Preventing spyware/malware from installing in a registry |
US20070156696A1 (en) | 2005-12-29 | 2007-07-05 | Blue Jungle | Detecting Behavioral Patterns and Anomalies Using Activity Data |
US20070192863A1 (en) | 2005-07-01 | 2007-08-16 | Harsh Kapoor | Systems and methods for processing data flows |
US20070240217A1 (en) | 2006-04-06 | 2007-10-11 | George Tuvell | Malware Modeling Detection System And Method for Mobile Platforms |
US7415727B1 (en) | 2004-06-24 | 2008-08-19 | Mcafee, Inc. | System, method, and computer program product for tailoring security responses for local and remote file open requests |
US20080301796A1 (en) | 2007-05-31 | 2008-12-04 | Microsoft Corporation | Adjusting the Levels of Anti-Malware Protection |
US7506155B1 (en) | 2000-06-22 | 2009-03-17 | Gatekeeper Llc | E-mail virus protection system and method |
US20090113111A1 (en) | 2007-10-30 | 2009-04-30 | Vmware, Inc. | Secure identification of execution contexts |
US7568231B1 (en) | 2004-06-24 | 2009-07-28 | Mcafee, Inc. | Integrated firewall/virus scanner system, method, and computer program product |
US7624447B1 (en) | 2005-09-08 | 2009-11-24 | Cisco Technology, Inc. | Using threshold lists for worm detection |
US20100011209A1 (en) | 2002-12-19 | 2010-01-14 | Vmware, Inc. | Secure execution of a computer program |
US20100064367A1 (en) | 2005-02-02 | 2010-03-11 | Universitetet I Oslo | Intrusion detection for computer programs |
US7757361B2 (en) | 2001-12-14 | 2010-07-20 | Mcafee, Inc. | Method and system for delayed write scanning for detecting computer malwares |
US7765593B1 (en) | 2004-06-24 | 2010-07-27 | Mcafee, Inc. | Rule set-based system and method for advanced virus protection |
US7895656B1 (en) | 2006-03-29 | 2011-02-22 | Symantec Corporation | Automated detection and configuration of security domains |
US20110083176A1 (en) | 2009-10-01 | 2011-04-07 | Kaspersky Lab, Zao | Asynchronous processing of events for malware detection |
US20120255000A1 (en) | 2011-03-29 | 2012-10-04 | Mcafee, Inc. | System and method for below-operating system trapping and securing of interdriver communication |
US8352939B1 (en) | 2007-12-03 | 2013-01-08 | Mcafee, Inc. | System, method and computer program product for performing a security or maintenance operation in association with virtual disk data |
US8353033B1 (en) | 2008-07-02 | 2013-01-08 | Symantec Corporation | Collecting malware samples via unauthorized download protection |
WO2013025323A1 (en) | 2011-08-17 | 2013-02-21 | Mcafee, Inc. | System and method for indirect interface monitoring and plumb-lining |
US8458797B1 (en) * | 2004-03-25 | 2013-06-04 | Trend Micro Incorporated | System and method for securing computers against computer viruses |
US8561176B1 (en) | 2007-01-24 | 2013-10-15 | Mcafee, Inc. | System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface |
US20130276119A1 (en) | 2008-03-11 | 2013-10-17 | Jonathan L. Edwards | System, method, and computer program product for reacting to a detection of an attempt by a process that is unknown to control a process that is known |
US20130276002A1 (en) | 2008-01-24 | 2013-10-17 | Gregory William Dalcher | System, method, and computer program product for invoking an application program interface within an interception of another application program interface |
US20130275952A1 (en) | 2008-03-05 | 2013-10-17 | Gregory William Dalcher | System, method, and computer program product for identifying unwanted data based on an assembled execution profile of code |
US8572729B1 (en) | 2006-01-30 | 2013-10-29 | Mcafee, Inc. | System, method and computer program product for interception of user mode code execution and redirection to kernel mode |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060095961A1 (en) * | 2004-10-29 | 2006-05-04 | Priya Govindarajan | Auto-triage of potentially vulnerable network machines |
-
2008
- 2008-04-29 US US12/111,851 patent/US8621608B2/en active Active
-
2013
- 2013-12-05 US US14/098,274 patent/US8955121B2/en active Active
-
2015
- 2015-02-05 US US14/615,271 patent/US20150186646A1/en not_active Abandoned
Patent Citations (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5974549A (en) | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6530024B1 (en) * | 1998-11-20 | 2003-03-04 | Centrax Corporation | Adaptive feedback security system and method |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US6594686B1 (en) | 2000-03-02 | 2003-07-15 | Network Associates Technology, Inc. | Obtaining user responses in a virtual execution environment |
US6931540B1 (en) | 2000-05-31 | 2005-08-16 | Networks Associates Technology, Inc. | System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed |
US7506155B1 (en) | 2000-06-22 | 2009-03-17 | Gatekeeper Llc | E-mail virus protection system and method |
US7085934B1 (en) | 2000-07-27 | 2006-08-01 | Mcafee, Inc. | Method and system for limiting processor utilization by a virus scanner |
US7188367B1 (en) | 2001-03-30 | 2007-03-06 | Moafee, Inc. | Virus scanning prioritization using pre-processor checking |
US7757361B2 (en) | 2001-12-14 | 2010-07-20 | Mcafee, Inc. | Method and system for delayed write scanning for detecting computer malwares |
US20030131256A1 (en) | 2002-01-07 | 2003-07-10 | Ackroyd Robert John | Managing malware protection upon a computer network |
US20030149888A1 (en) | 2002-02-01 | 2003-08-07 | Satyendra Yadav | Integrated network intrusion detection |
US20030149887A1 (en) | 2002-02-01 | 2003-08-07 | Satyendra Yadav | Application-specific network intrusion detection |
US20100011209A1 (en) | 2002-12-19 | 2010-01-14 | Vmware, Inc. | Secure execution of a computer program |
US20050108562A1 (en) | 2003-06-18 | 2005-05-19 | Khazan Roger I. | Technique for detecting executable malicious code using a combination of static and dynamic analyses |
US20050071633A1 (en) | 2003-09-30 | 2005-03-31 | Check Point Software Technologies, Inc. | System Providing Methodology for Securing Interfaces of Executable Files |
US20050182967A1 (en) | 2004-02-13 | 2005-08-18 | Microsoft Corporation | Network security device and method for protecting a computing device in a networked environment |
US8458797B1 (en) * | 2004-03-25 | 2013-06-04 | Trend Micro Incorporated | System and method for securing computers against computer viruses |
US7765593B1 (en) | 2004-06-24 | 2010-07-27 | Mcafee, Inc. | Rule set-based system and method for advanced virus protection |
US20060041942A1 (en) | 2004-06-24 | 2006-02-23 | Mcafee, Inc. | System, method and computer program product for preventing spyware/malware from installing a registry |
US7568231B1 (en) | 2004-06-24 | 2009-07-28 | Mcafee, Inc. | Integrated firewall/virus scanner system, method, and computer program product |
US7415727B1 (en) | 2004-06-24 | 2008-08-19 | Mcafee, Inc. | System, method, and computer program product for tailoring security responses for local and remote file open requests |
US7441273B2 (en) | 2004-09-27 | 2008-10-21 | Mcafee, Inc. | Virus scanner system and method with integrated spyware detection capabilities |
US7581254B2 (en) | 2004-09-27 | 2009-08-25 | Mcafee, Inc. | Virus scanner system and method with integrated spyware detection capabilities |
GB2418503A (en) | 2004-09-27 | 2006-03-29 | Mcafee Inc | Virus scanner with integrated spyware scanning/detecting capabilities |
US7984503B2 (en) | 2004-09-27 | 2011-07-19 | Mcafee, Inc. | System, method and computer program product for accelerating malware/spyware scanning |
US20060143447A1 (en) | 2004-12-23 | 2006-06-29 | Microsoft Corporation | Managing elevated rights on a network |
US20100064367A1 (en) | 2005-02-02 | 2010-03-11 | Universitetet I Oslo | Intrusion detection for computer programs |
US20070192863A1 (en) | 2005-07-01 | 2007-08-16 | Harsh Kapoor | Systems and methods for processing data flows |
US7624447B1 (en) | 2005-09-08 | 2009-11-24 | Cisco Technology, Inc. | Using threshold lists for worm detection |
GB2432687A (en) | 2005-11-25 | 2007-05-30 | Mcafee Inc | Preventing spyware/malware from installing in a registry |
GB2432686A (en) | 2005-11-25 | 2007-05-30 | Mcafee Inc | Accelerated file scanning for spyware/malware |
US20070156696A1 (en) | 2005-12-29 | 2007-07-05 | Blue Jungle | Detecting Behavioral Patterns and Anomalies Using Activity Data |
US8572729B1 (en) | 2006-01-30 | 2013-10-29 | Mcafee, Inc. | System, method and computer program product for interception of user mode code execution and redirection to kernel mode |
US7895656B1 (en) | 2006-03-29 | 2011-02-22 | Symantec Corporation | Automated detection and configuration of security domains |
US20070240217A1 (en) | 2006-04-06 | 2007-10-11 | George Tuvell | Malware Modeling Detection System And Method for Mobile Platforms |
US8561176B1 (en) | 2007-01-24 | 2013-10-15 | Mcafee, Inc. | System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface |
US20080301796A1 (en) | 2007-05-31 | 2008-12-04 | Microsoft Corporation | Adjusting the Levels of Anti-Malware Protection |
US20090113111A1 (en) | 2007-10-30 | 2009-04-30 | Vmware, Inc. | Secure identification of execution contexts |
US8352939B1 (en) | 2007-12-03 | 2013-01-08 | Mcafee, Inc. | System, method and computer program product for performing a security or maintenance operation in association with virtual disk data |
US20130276002A1 (en) | 2008-01-24 | 2013-10-17 | Gregory William Dalcher | System, method, and computer program product for invoking an application program interface within an interception of another application program interface |
US20130275952A1 (en) | 2008-03-05 | 2013-10-17 | Gregory William Dalcher | System, method, and computer program product for identifying unwanted data based on an assembled execution profile of code |
US20130276119A1 (en) | 2008-03-11 | 2013-10-17 | Jonathan L. Edwards | System, method, and computer program product for reacting to a detection of an attempt by a process that is unknown to control a process that is known |
US8353033B1 (en) | 2008-07-02 | 2013-01-08 | Symantec Corporation | Collecting malware samples via unauthorized download protection |
US20110083176A1 (en) | 2009-10-01 | 2011-04-07 | Kaspersky Lab, Zao | Asynchronous processing of events for malware detection |
US20120255000A1 (en) | 2011-03-29 | 2012-10-04 | Mcafee, Inc. | System and method for below-operating system trapping and securing of interdriver communication |
US20130047255A1 (en) | 2011-08-17 | 2013-02-21 | Gregory W. Dalcher | System and method for indirect interface monitoring and plumb-lining |
WO2013025323A1 (en) | 2011-08-17 | 2013-02-21 | Mcafee, Inc. | System and method for indirect interface monitoring and plumb-lining |
Non-Patent Citations (15)
Title |
---|
Dalcher, Greg, "System, Method and Computer Program Product for Analyzing Stack Call Frames That Are Monitored While a Stack Is Unwound", U.S. Appl. No. 11/749,635, filed May 16, 2007. |
Edwards et al., "System, Method and Computer Program Product for Analyzing Differing Aspects of Data", U.S. Appl. No. 11/776,485, filed Jul. 11, 2007. |
Edwards, Jonathan, "System, Method and Computer Program Product for Scanning Computer Code in Association With the Compilation Thereof", U.S. Appl. No. 11/194,236, filed Aug. 1, 2005. |
International Search Report and Written Opinion received for PCT Application No. PCT/US2012/048415, mailed on Dec. 10, 2012, 9 pages. |
Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks by Sun et al; Publisher: IEEE; Date: Oct. 2007. * |
Notice of Allowance received for U.S. Appl. No. 12/111,851, mailed on Sep. 5, 2013, 14 pages. |
Notice of Allowance received for U.S. Appl. No. 13/211,999, mailed on Dec. 11, 2013, 10 pages. |
Office Action received for U.S. Appl. No. 12/111,851, mailed on Apr. 20, 2011, 23 pages. |
Office Action received for U.S. Appl. No. 12/111,851, mailed on Aug. 24, 2011, 21 pages. |
Office Action received for U.S. Appl. No. 12/111,851, mailed on May 23, 2012, 27 pages. |
Office Action received for U.S. Appl. No. 12/111,851, mailed on Oct. 18, 2012, 31 pages. |
Office Action received for U.S. Appl. No. 13/211,999, mailed on Jul. 19, 2013, 10 pages. |
Office Action received for U.S. Appl. No. 13/211,999, mailed on Mar. 1, 2013, 15 pages. |
Office Action received for U.S. Appl. No. 13/211,999, mailed on Nov. 13, 2012, 13 pages. |
Vlachos et al., "Promising Steps Towards Computer Hygiene", Publisher: International Network Conference, Department of Management Science and Technology, Athens University of Economics, 2006, 7 pages. |
Also Published As
Publication number | Publication date |
---|---|
US20130276112A1 (en) | 2013-10-17 |
US20150186646A1 (en) | 2015-07-02 |
US8621608B2 (en) | 2013-12-31 |
US20140096252A1 (en) | 2014-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8955121B2 (en) | System, method, and computer program product for dynamically adjusting a level of security applied to a system | |
US12019734B2 (en) | Methods and apparatus for control and detection of malicious content using a sandbox environment | |
US11343280B2 (en) | System and method for identifying and controlling polymorphic malware | |
US12013941B2 (en) | Analysis of malware | |
US10872151B1 (en) | System and method for triggering analysis of an object for malware in response to modification of that object | |
AU2018217323B2 (en) | Methods and systems for identifying potential enterprise software threats based on visual and non-visual data | |
US20180026995A1 (en) | Dynamic sensors | |
US8869272B2 (en) | System, method, and computer program product for preventing a modification to a domain name system setting | |
US10009370B1 (en) | Detection and remediation of potentially malicious files | |
EP2920737B1 (en) | Dynamic selection and loading of anti-malware signatures | |
EP2624163A1 (en) | Method for detecting malware | |
US9444765B2 (en) | Dynamic categorization of network resources | |
US8789174B1 (en) | Method and apparatus for examining network traffic and automatically detecting anomalous activity to secure a computer | |
US10419525B2 (en) | Server-based system, method, and computer program product for scanning data on a client using only a subset of the data | |
US9785775B1 (en) | Malware management | |
US8141153B1 (en) | Method and apparatus for detecting executable software in an alternate data stream | |
US10063558B2 (en) | Method for blocking unauthorized data access and computing device with feature of blocking unauthorized data access | |
US10880316B2 (en) | Method and system for determining initial execution of an attack | |
US20220342985A1 (en) | Anomaly detection and characterization in app permissions | |
US12301620B2 (en) | Detecting malicious URL redirection chains | |
US20230283632A1 (en) | Detecting malicious url redirection chains | |
RU2757408C1 (en) | System and method for forming rule for checking file for maliciousness | |
RU2595510C1 (en) | Method for excluding processes of antivirus scanning on the basis of data on file | |
JP2023078441A (en) | Execution control system, execution control method, and program | |
CN115408690A (en) | System and method for detecting potentially malicious changes in an application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: CHANGE OF NAME AND ENTITY CONVERSION;ASSIGNOR:MCAFEE, INC.;REEL/FRAME:043665/0918 Effective date: 20161220 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045055/0786 Effective date: 20170929 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045056/0676 Effective date: 20170929 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:054206/0593 Effective date: 20170929 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:055854/0047 Effective date: 20170929 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:054238/0001 Effective date: 20201026 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:059354/0213 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:059354/0335 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:060792/0307 Effective date: 20220301 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |